How MNOs Can Maximize Monetization of A2P and P2A

SAP Thought Leadership Paper/SAP Mobile Services
How MNOs Can Maximize Monetization of A2P
and P2A Messaging
Securing Messaging Services – The Key Driver for
Maximizing Monetization
Table of Contents
3
Overview
4
The impact of growing A2P messaging on MNO revenues
5
The SMS firewall: Enabling the monetization of the growing A2P
6
Aspects for MNOs to consider while selecting an SMS firewall solution
6
Solution type
7
Solution deployment
8
Fraud mitigation capabilities
9
Conclusion
2 / 10
How MNOs can maximize monetization of A2P and P2A messaging
Overview : In recent years, mobile network operators
(MNOs) and mobile virtual network operators
(MVNOs) have undergone a turbulent phase in terms
of revenues. While network expansion demands
have increased CAPEX and OPEX, revenues have not
been proportional with voice and messaging usage,
decreasing after 2012 while over-the-top (OTT)
services have grown almost exponentially. Mobile
broadband and data usage has risen proportionally
with the demand for OTT services to a point where
MNOs and MVNOs feared relegation to wireless and
mobile bit pipe providers.
Over the last few years, SMS-based messaging
has seen a revival, growing to 8.3 trillion messages
(24% of the total messages sent, annually) from 6.7
trillion, which it dipped to after a peak of 9 trillion in
2012. Application-to-person (A2P) messaging and
person-to-application (P2A) messaging have shown
encouraging growth in the last two years, with their
combined revenues rising from 25% to 40% of the
total annual messaging revenue. Juniper Research
estimates that A2P (and P2A)
revenues will reach US$70 billion
by the end of 2016,
indicating a significant
market opportunity.
A2P alone is estimated
to reach 31% of the
total annual messaging
traffic.
3 / 10
How MNOs can maximize monetization of A2P and P2A messaging
The Impact of Growing A2P Messaging on
MNO Revenues
MNOs became part of the Internet ecosystem
with mobile broadband services. Consequently,
connectivity between some elements of MNO
networks, such as Short Message service
centers (SMSCs), included IP interfaces and
opened up e-mail-to-text and text-to-e-mail
messaging. Including IP into the services has
brought in a new set of risks to MNO services.
Specifically, SMS messaging is vulnerable to
identity spoofing, faking, spam, and denial of
service (DoS). These vulnerabilities directly
impact customer experience and satisfaction. A
severe impact on revenues is caused by the use
of gray routes, which cause traffic that cannot
be billed due to the lack of any commercial
agreement . Revenue losses are significant
although the new opportunity for the growth
of A2P messaging volume exists (66% of
messaging traffic is on gray routes).
The use of messaging has evolved from simple
messaging, such as notifications and alerts,
to its use in real-time user authentication,
ticketing, and mobile payments. These new
messaging scenarios are based on a customer’s
identity on the MNO’s network and require
stringent service quality (authenticated
message sources and destinations, timely
and reliable deliveries). Customer needs have
evolved to require near real-time out-of-band
authentication. It is expected that the MNO
services will be increasingly used to supplement
a user’s identity on the Internet. An MNO’s role
in the Internet ecosystem, which was only that
of an access provider, has now become crucial.
Added to this is the very recent deployment
of the Internet of Things (IoT) infrastructure,
which relies on the coverage and access of
the MNO – another opportunity to increase
revenues. Such networks could use the MNO
infrastructure for primary access or for fallback
access. The traffic from such networks is largely
from the IoT devices to an aggregation point on
the Internet. However, control messages to the
devices would use the MNO network.
In summary, the growth of A2P
messaging and its estimated
growth are encouraging
opportunities for monetization,
with the IoT bringing in another
revenue opportunity.
4 / 10
How MNOs can maximize monetization of A2P and P2A messaging
The SMS firewall: Enabling the monetization
of the growing A2P
While the SMS firewall is a mandatory initial
step in optimizing monetization, MNOs should
consider selecting a solution that is both a
network tool and a business tool. The network
tool can perform secure functions, monitoring,
and reporting whereas the business tool can
provide analytics such as characteristics
and trends. The primary checks of such a
firewall include checks of the sender ID and of
the sending global title, and the scanning of
messages for keywords, repetitive content, and
repetitive senders, in addition to other routine
checks.
A selective number of providers offer
sophisticated solutions that correlate
Signaling System No. 7 (SS7) information,
which includes routing capacities (home
routing), unlimited filters’ combination
options, and managed services. These are
important considerations when choosing a
firewall solution.
5 / 10
How MNOs can maximize monetization of A2P and P2A messaging
Aspects for MNOs to consider while
selecting an SMS firewall solution
While various flavors of SMS firewalls are available in the market, MNOs should consider the
following aspects when making their selection:
Solution Type
Table 1 lists available solutions based on their categories.
Category
Description
Signaling Based
Generally offered as an add-on service by carriers or hubs, this type
has basic screening capabilities and is hosted by vendor. If offered by
SS7 providers, all traffic handled by alternative SS7 carriers will not
be filtered. This solution can detect some spam and fraud but is not
efficient for A2P monetization.
Gateway Based
Often hardware based and on premise, these vendors’ solutions offer
similar filtering features to those of the signaling-based type. The
quality of gateway-based solutions varies greatly; certain solutions may
offer extended filtering capabilities for A2P detection. This solution
type generally involves high CAPEX and OPEX; managed services are
not offered.
Integrated Solution
Typically also an in-house solution, it bases added functionality on
already existing mobile network nodes. Generally it consists of a very
limited subset of blocking features integrated on an STP or SMSC. User
interface is basic (potentially command only) and reporting is missing.
Reporting Based
These solutions offer quite powerful reports and analytics but have no
blocking function; MNO will block the unwanted traffic basing on the
info gathered from vendor. Designed for e-mail spam protection, these
solutions fully lack or have limited visibility on SS7 information. This
means, among other things, no faking protection and no origin-based
or MO filtering.
IP Based Solutions
Usually are components in larger security suites of network software,
designed more for security and signaling analysis than revenue
assurance. The ability to aggregate SS7 data and understand the
transactions is restricted. Grey routes can’t be identified and faking
protection is not offered
6 / 10
How MNOs can maximize monetization of A2P and P2A messaging
Home Routing Solutions
The home routing based solution is deployed as a network node with
its own global title. From a logical perspective, it works as a network
node within the operator’s network, even if hosted as a cloud service.
Home routing is the only solution efficiently protecting from faking and
also protecting customers when roaming. Filters and rules flexibility
might vary depending on provider. The main drawback of this solution’s
suppliers is a lack of A2P knowledge. Firewall configuration and tuning
is often left with customer and managed services are rarely part of the
offer.
Table 1: Categories of SMS Firewall Solutions in the Market
MNOs should note that, of all the options
available, only the home routing solutions
offer the complete suite of message scanning,
monitoring, filtering, and protection while
roaming. Home routing solutions are therefore
crucial to achieve full monetization of A2P
as they protect from faking attacks and the
quality of service delivered to the customer
is completely under the control of the
provider. Moreover, as fraud and misuse
techniques constantly evolve, MNOs should
not underestimate the need to keep the firewall
tuned and up to state-of-the-art standards.
In short, update service should be a core
requirement.
Solution Deployment
Another aspect MNOs should take into
consideration while selecting an SMS firewall
solution is deployment since many solutions
are provided either as a standalone hardware
device or as a managed service hosted in a
cloud. Compared to a standalone hardware
device solution, a cloud-based solution offers
reduced CAPEX and OPEX by avoiding large
upfront investments in infrastructure and HR,
respectively. The managed service implies
low service startup costs, which increases the
overall A2P messaging revenues. This enhances
the capability of the managed firewall service
provider to maximize MNO monetization of A2P.
7 / 10
How MNOs can maximize monetization of A2P and P2A messaging
Fraud mitigation capabilities
Table 2 lists the fraud mitigation features that MNOs should look for when selecting an SMS
firewall solution, including a description of the fraud and the solution required for each,
Fraud Type
Description
Mitigation
SMS Faking
Submitting SMSC address is faked.
The destination network cannot
track who sent a message for billing.
Messages with a faked SMSC
address should be identified
and rejected SS7 information
correlation
SMS Spamming
Unsolicited MT messages sent to
the operator´s subscribers. Often
include premium rate number,
e-mail address, or URL.
Content verification through
SMS firewall service, or through
addition of an enhanced content
filtering platform.
SMS Flooding
Large number of messages to
single or multiple subscribers,
create denial of service attacks,
loss of revenue and costs.
Volume of messages sent by
same sender in a set timeframe
are verified and blocked if a
configurable threshold is met.
SMS Malware
Over the air (OTA) or wireless
application protocol (WAP)
push service might cause illicit
downloads and generate excessive
traffic or send premium messages
without the user’s knowledge.
An effective solution should block
OTA and WAP push messages from
untrusted sources
Rule based filtering
Specify rules in the firewall to
match message patterns and
requirements, and perform specific
actions (block or monitor and
route).
Certain types of messages, such
as OTA or WAP push, are used to
distribute software. An effective
solution should block software
download by blocking these types of
messages from untrusted sources.
It should be able to distinguish
and allow this message type from
trusted sources, for example from
the operator itself, while blocking it
from all other sources.
A good firewall solution should
be able to block such senders
but filtering rules could be
bypassed for certain whitelisted
SMSCs.
Alphanumeric and
Short Code sender
Table 2: Common Frauds and the Required Mitigation (from the GSM Association’s official
documents on SMS SS7 Fraud and SMS SS7 Fraud Prevention, document numbers GSM IR 70, 71)
8 / 10
How MNOs can maximize monetization of A2P and P2A messaging
Messaging services have suffered revenue losses due to spam, spoofing, faking, and DoS with
losses due to gray routes having the highest impact. The lack of monitoring and transparency into
messaging, combined with the inability to differentiate illegitimate traffic from legitimate traffic,
severely limits the MNO’s ability to implement quality of messaging service and security required
to realize the full potential of A2P monetization. In fact, a mere 33% of the MNOs are able to
monetize A2P messaging, according to mobilesquared Ltd. The ideal SMS firewall provides both
message monitoring and transparency to implement quality and security required for monetizing
A2P. With an appropriately configured solution, the A2P messaging traffic is accounted, identified,
filtered as required, and delivered. In addition, the firewall can provide invaluable data for
monitoring usage, usage patterns and volumes, and performance as well as customer behavior.
Such analytics provide business intelligence, which the MNO can capitalize on.
Conclusion
MNOs today are attempting to safeguard
their networks and services with a particular
emphasis on security. Businesses are using
MNO network services to extend their services
to customers. Their primary means of customer
engagement is through automated messaging,
termed A2P messaging. A2P messaging is
growing substantially in volume, but there is
revenue loss. Not all of the messaging volume is
monetized. A2P messaging supports services in
real time and MNOs are expected to deliver the
required quality of service. A2P messaging is
increasing in use for authentication support and
mobile payments, both of which require that
the A2P messages be authenticated for their
source and that the integrity of the messages
be preserved.
For such stringent requirements, it is crucial
that MNOs ring-fence their networks to ensure
that all traffic from links that are vulnerable
(mostly grey and black routes over international
SS7) is monitored and checked for origin and
content, and filtered appropriately to provide
good customer experience as well as to
monetize A2P and P2A messages.
The ideal SMS firewall solution to enable
this monetization should be a home
routing solution, offered as a cloud-based
managed service that guarantees ease-ofimplementation and lossless transition. The
managed service ensures continuous tuning of
the firewall services and updating of the firewall
intelligence. Human resources savings for the
MNO are a given since the operational skills
are available as part of the managed service.
Filtering is the key activity in the service, with
continuously updated rules to ensure
precision filtering to enhance customer
experience. Above all, the managed
service ensures a proactive approach
to unknown messaging content and
evolving threats to A2P messaging as
security updates are deployed instantly
to minimize the impact of new threats
that emerge.
9 / 10
No part of this publication may be reproduced or transmitted in any form or for any purpose without the
express permission of SAP SE or an SAP affi liate company.
SAP and other SAP products and services mentioned herein as well as their respective logos are
trademarks or registered trademarks of SAP SE (or an SAP affi liate company) in Germany and other
countries. Please see http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark for
additional trademark information and notices. Some software products marketed by SAP SE and its
distributors contain proprietary software components of other software vendors.
National product specifi cations may vary.
These materials are provided by SAP SE or an SAP affi liate company for informational purposes only,
without representation or warranty of any kind, and SAP SE or its affi liated companies shall not be
liable for errors or omissions with respect to the materials. The only warranties for SAP SE or SAP affi
liate company products and services are those that are set forth in the express warranty statements
accompanying such products and services, if any. Nothing herein should be construed as constituting an
additional warranty.
In particular, SAP SE or its affi liated companies have no obligation to pursue any course of business
outlined in this document or any related presentation, or to develop or release any functionality
mentioned therein. This document, or any related presentation, and SAP SE’s or its affi liated companies’
strategy and possible future developments, products, and/or platform directions and functionality are all
subject to change and may be changed by SAP SE or its affi liated companies at any time for any reason
without notice. The information in this document is not a commitment, promise, or legal obligation to
deliver any material, code, or functionality. All forward-looking statements are subject to various risks
and uncertainties that could cause actual results to diff er materially from expectations. Readers are
cautioned not to place undue reliance on these forward-looking statements, which speak only as of their
dates, and they should not be relied upon in making purchasing decisions.